Skip to content

Configure OIDC SSO

Use this page to configure OpenID Connect (OIDC) single sign-on (SSO) for Fusion Metadata Registry (FMR).

At a high level, the setup has two parts:

  1. Register the FMR installation as a client application in your identity provider (IdP).
  2. Enter the matching OIDC settings in FMR and verify the connection.

FMR uses the user's group membership for role-based authorisation, so your IdP must be able to return a groups claim as part of the sign-in process.

Step 1. Register FMR in the identity provider

Before configuring FMR, create an application registration in your IdP for the FMR installation.

Choose the client type

In most cases, FMR should be registered as a confidential client because it runs on a server and can securely store a client secret.

Use a public client only if your security policy requires it.

Client type How FMR authenticates to the IdP FMR fields to complete Additional IdP configuration
Confidential Client ID and Client Secret Client ID, Client Secret None
Public PKCE1 Client ID only Enable PKCE with challenge method S256

Configure the redirect URI

The redirect URI is the FMR callback URL that the IdP sends the user back to after successful authentication.

Note

The FMR OIDC callback path is /ws/fusion/oauth/callback.

Examples:

http://localhost:8080/ws/fusion/oauth/callback
https://registry.mydomain.org/ws/fusion/oauth/callback

Add the correct redirect URI for your FMR environment to the client registration in the IdP.

Configure scopes and claims

FMR needs enough information from the IdP to identify the user and determine their group membership.

The minimum scopes are:

  • openid
  • profile
  • groups

Some IdPs do not expose groups by default, so you may need to configure that claim explicitly.

Step 2. Configure OIDC in FMR

From the Authentication Service page, choose the OIDC / AD / LDAP mode, then enter the OIDC settings for your IdP.

FMR OIDC configuration

Issuer URI

Enter the IdP's issuer URI. This is the base OIDC issuer URL used by FMR to discover the provider's endpoints and signing keys.

Examples:

IdP URI pattern Example
Microsoft Entra ID https://login.microsoftonline.com/{tenant-id}/v2.0 https://login.microsoftonline.com/859c6b71-19d6-4402-959c-662283d73505/v2.0
Keycloak https://{keycloak-host}/realms/{realm} https://keycloak.mydomain.org/realms/my-organisation

Client ID

Enter the client ID that was assigned when you registered FMR in the IdP.

Client Secret

  • If FMR is registered as a confidential client, enter the client secret from the IdP.
  • If FMR is registered as a public client, leave this field blank. FMR will use PKCE instead of a client secret.

Test Connection

Use Test Connection to confirm that FMR can reach the IdP.

OIDC test connection

Note

Test Connection checks connectivity to the IdP. It does not confirm that the tenant, realm, client ID, client secret, scopes, or claims are all configured correctly.

Step 3. Complete authorisation setup

Successful sign-in only proves that authentication is working. To give users access inside FMR, you must also map the returned group names to FMR permissions.

Review these related pages:

Provider-specific examples

For provider-specific guidance, see:


  1. Proof Key for Code Exchange (PKCE) protects public clients by replacing a fixed client secret with a per-request code challenge and verifier.